Searched refs:k_re (Results 1 - 18 of 18) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_sim_db.h62 const u8 *k_aut, const u8 *k_re);
75 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; member in struct:eap_sim_reauth
H A Deap_sim_db.c121 " k_re CHAR(64)"
240 const u8 *k_encr, const u8 *k_aut, const u8 *k_re)
258 k_re ? ", k_re" : "",
282 if (k_re) {
284 pos += wpa_snprintf_hex(pos, end - pos, k_re,
323 } else if (os_strcmp(col[i], "k_re") == 0 && argv[i]) {
324 hexstr2bin(argv[i], reauth->k_re,
325 sizeof(reauth->k_re));
1189 * @k_re
238 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
1196 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
[all...]
H A Deap_server_aka.c25 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ member in struct:eap_aka_data
120 os_memcpy(data->k_re, data->reauth->k_re,
554 eap_aka_prime_derive_keys_reauth(data->k_re, data->counter,
838 data->k_re, data->msk, data->emsk);
1000 data->k_re);
1115 data->k_re);
/external/wpa_supplicant_8/src/eap_server/
H A Deap_sim_db.h62 const u8 *k_aut, const u8 *k_re);
75 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; member in struct:eap_sim_reauth
H A Deap_sim_db.c121 " k_re CHAR(64)"
240 const u8 *k_encr, const u8 *k_aut, const u8 *k_re)
258 k_re ? ", k_re" : "",
282 if (k_re) {
284 pos += wpa_snprintf_hex(pos, end - pos, k_re,
323 } else if (os_strcmp(col[i], "k_re") == 0 && argv[i]) {
324 hexstr2bin(argv[i], reauth->k_re,
325 sizeof(reauth->k_re));
1189 * @k_re
238 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
1196 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
[all...]
H A Deap_server_aka.c25 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ member in struct:eap_aka_data
120 os_memcpy(data->k_re, data->reauth->k_re,
554 eap_aka_prime_derive_keys_reauth(data->k_re, data->counter,
838 data->k_re, data->msk, data->emsk);
1000 data->k_re);
1115 data->k_re);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_sim_db.h62 const u8 *k_aut, const u8 *k_re);
75 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; member in struct:eap_sim_reauth
H A Deap_sim_db.c121 " k_re CHAR(64)"
240 const u8 *k_encr, const u8 *k_aut, const u8 *k_re)
258 k_re ? ", k_re" : "",
282 if (k_re) {
284 pos += wpa_snprintf_hex(pos, end - pos, k_re,
323 } else if (os_strcmp(col[i], "k_re") == 0 && argv[i]) {
324 hexstr2bin(argv[i], reauth->k_re,
325 sizeof(reauth->k_re));
1189 * @k_re
238 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
1196 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
[all...]
H A Deap_server_aka.c25 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ member in struct:eap_aka_data
120 os_memcpy(data->k_re, data->reauth->k_re,
554 eap_aka_prime_derive_keys_reauth(data->k_re, data->counter,
838 data->k_re, data->msk, data->emsk);
1000 data->k_re);
1115 data->k_re);
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.h94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
95 int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter,
111 u8 *k_encr, u8 *k_aut, u8 *k_re,
116 static inline int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, argument
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.c278 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk)
311 os_memcpy(k_re, pos, EAP_AKA_PRIME_K_RE_LEN);
313 k_re, EAP_AKA_PRIME_K_RE_LEN);
325 int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, argument
342 prf_prime(k_re, "EAP-AKA' re-auth", identity, identity_len,
276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sim_common.h94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
95 int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter,
111 u8 *k_encr, u8 *k_aut, u8 *k_re,
116 static inline int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, argument
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.c278 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk)
311 os_memcpy(k_re, pos, EAP_AKA_PRIME_K_RE_LEN);
313 k_re, EAP_AKA_PRIME_K_RE_LEN);
325 int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, argument
342 prf_prime(k_re, "EAP-AKA' re-auth", identity, identity_len,
276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sim_common.h94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
95 int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter,
111 u8 *k_encr, u8 *k_aut, u8 *k_re,
116 static inline int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, argument
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.c278 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk)
311 os_memcpy(k_re, pos, EAP_AKA_PRIME_K_RE_LEN);
313 k_re, EAP_AKA_PRIME_K_RE_LEN);
325 int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, argument
342 prf_prime(k_re, "EAP-AKA' re-auth", identity, identity_len,
276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_aka.c29 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ member in struct:eap_aka_data
135 os_memset(data->k_re, 0, EAP_AKA_PRIME_K_RE_LEN);
1007 data->k_re, data->msk, data->emsk);
1242 eap_aka_prime_derive_keys_reauth(data->k_re, data->counter,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_aka.c29 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ member in struct:eap_aka_data
135 os_memset(data->k_re, 0, EAP_AKA_PRIME_K_RE_LEN);
1007 data->k_re, data->msk, data->emsk);
1242 eap_aka_prime_derive_keys_reauth(data->k_re, data->counter,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_aka.c29 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ member in struct:eap_aka_data
135 os_memset(data->k_re, 0, EAP_AKA_PRIME_K_RE_LEN);
1007 data->k_re, data->msk, data->emsk);
1242 eap_aka_prime_derive_keys_reauth(data->k_re, data->counter,

Completed in 99 milliseconds